Conference Articles

  1. Fernandez, V., Orue, A. B., & Arroyo, D. (2021). Securing Blockchain with Quantum Safe Cryptography: When and How? In Computational Intelligence in Security for Information Systems Conference CISIS 2019: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) (pp. 371–379). Springer. https://doi.org/10.1007/978-3-030-57805-3_35 Details->
  2. Palacio Marín, I., & Arroyo, D. (2021). Fake News Detection. In Computational Intelligence in Security for Information Systems Conference CISIS 2019: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) (pp. 229–238). Springer. https://doi.org/10.1007/978-3-030-57805-3_22 Details->
  3. Arribas, I., Arroyo, D., & Reshef Kera, D. (2020). Sandbox for Minimal Viable Governance of Blockchain Services and DAOs: CLAUDIA. In Blockchain and Applications. BLOCKCHAIN 2020. Advances in Intelligent Systems and Computing, vol 1238 (pp. 24–30). Springer. https://doi.org/10.1007/978-3-030-52535-4_3 Details->
  4. Iglesias García, J., Diaz, J., & Arroyo, D. (2019). Hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT. In International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019). Retrieved from https://doi.org/10.1007/978-3-030-20005-3_20 Details->
  5. Querejeta Azurmendi, I., Hernández Encinas, L., Arroyo Guardeño, D., & and López Hernández-Ardieta, J. (2019). An Internet Voting Proposal Towards Improving Usability and Coercion Resistance. In International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019). Retrieved from https://doi.org/10.1007/978-3-030-20005-3_16 Details->
  6. Diaz, J., Choi, S. G., Arroyo, D., Keromytis, A. D., Rodriguez, F. B., & Yung, M. (2018). Privacy in e-shopping transactions: Exploring and addressing the trade-offs. In International Symposium on Cyber Security Cryptography and Machine Learning (pp. 206–226). Springer, Cham. Details->
  7. Iglesias García, J., & Arroyo, D. (2018). Desarrollo de un sistema de trazabilidad en entornos IoT mediante Hyperledger. In Jornadas Nacionales de Investigación en Ciberseguridad (JNIC2018), San Sebastián. Details->
  8. de la Torre, G., Lago, L. F., & Arroyo, D. (2018). Desarrollo de una metodología para la caracterización de fuentes de datos heterogéneos e identificación de anomalías en sistemas de información. In Jornadas Nacionales de Investigación en Ciberseguridad (JNIC2018), San Sebastián. Details->
  9. de la Torre, G., Lago, L. F., & Arroyo, D. (2018). Aplicación de técnicas de compresión de información a la identificación de anomalías en fuentes de datos heterogéneas: análisis y limitaciones. In XV RECSI. Retrieved from https://nesg.ugr.es/recsi2018/docs/ProgramaRECSI2018.pdf Details->
  10. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2017). Fair and Accountable Anonymity for the Tor Network. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017) (pp. 560–565). SciTePress. https://doi.org/10.5220/0006474805600565 Details->
  11. Elices, I., Arroyo, D., Levi, R., Rodriguez, F. B., & Varona, P. (2017). Role of asymmetry in shaping spiking-bursting activity of Central Pattern Generators. In 26th Annual Computational Neuroscience Meeting (CNS 2017). Details->
  12. Querejeta, I., López Hernández-Ardieta, J., Gayoso Martínez, V., Hernández Encinas, L., & Arroyo Guardeño, D. (2017). A coercion-resistant and easy-to-use Internet e-voting protocol based on traceable anonymous certificates. In Jornandas Nacionales de Investigación en Ciberseguridad (JNIC2017), Madrid. Retrieved from http://2017.jnic.es/wp/?page_id=351 Details->
  13. Sanchez-Gomez, A., Diaz, J., & Arroyo, D. (2017). Encrypted Cloud: A Software Solution for the Secure Use of Free-Access Cloud Storage Services. In International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding (pp. 683–692). Springer, Cham. Details->
  14. de la Torre-Abaitua, G., Lago-Fernández, L. F., & Arroyo, D. (2017). A Parameter-Free Method for the Detection of Web Attacks. In International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding (pp. 661–671). Springer, Cham. Details->
  15. Elices, I., Arroyo, D., Levi, R., Rodriguez, F. B., & Varona, P. (2016). Assessing irregularity and coordination of spiking-bursting rhythms in central pattern generators. In 25th annual computational neuroscience meeting: CNS-2016 (Vol. 17, p. 54). BioMed Central. Details->
  16. Elices, I., Arroyo, D., Levi, R., Rodriguez, F. B., & Varona, P. (2016). Coordination of irregular bursting rhythms in central pattern generators. . In Society for Neuroscience. Details->
  17. Diaz, J., Choi, S., Arroyo, D., Keromytis, A. D., Rodrı́guez Francisco de Borja, & Yung, M. (2016). Privacy Threats in E-Shopping (Position Paper). In Lecture Notes in Computer Science. Springer Verlag. Details->
  18. Arroyo, D., Diaz, J., & Gayoso Vı́ctor. (2015). On the difficult tradeoff between security and privacy: Challenges for the management of digital identities. In International Joint Conference - CISIS’15 and ICEUTE’15, 8th International Conference on Computational Intelligence in Security for Information Systems / 6th International Conference on EUropean Transnational Education, Burgos, Spain, 15-17 June, 2015 (pp. 455–462). Springer, Cham. Details->
  19. Arroyo, D., Diaz, J., & Rodriguez, F. B. (2015). Non-conventional Digital Signatures and Their Implementations—A Review. In International Joint Conference - CISIS’15 and ICEUTE’15, 8th International Conference on Computational Intelligence in Security for Information Systems / 6th International Conference on EUropean Transnational Education, Burgos, Spain, 15-17 June, 2015 (pp. 425–435). Springer, Cham. Details->
  20. Arroyo Guardeño, D., Gayoso Martínez, V., Hernández Encinas, L., & Martín Muñoz, A. (2015). Using Smart Cards for Authenticating in Public Services: A Comparative Study. In Á. Herrero, B. Baruque, J. Sedano, H. Quintián, & E. Corchado (Eds.), International Joint Conference (pp. 437–446). Cham: Springer International Publishing.

    Details->
  21. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2014). Methodological Security Verification of a Registration Protocol. In International Joint Conference SOCO’14-CISIS’14-ICEUTE’14 (pp. 453–462). Springer, Cham. Details->
  22. Arroyo, D., & Varona, P. (2014). Special Session 77: Theoretical, Technical, and Experimental Challenges in Closed-Loop Approaches in Biology. In The 10th AIMS Conference on Dynamical Systems,Differential Equations and Applications. Madrid, Spain - July 7-11, 2014. Details->
  23. Arroyo, D., Varona, P., & Rodriguez, F. B. (2014). Automatic event detection and characterization in the context of real-time control of complex time-varying dynamical systems. In The 10th AIMS Conference on Dynamical Systems,Differential Equations and Application. Madrid, Spain - July 7-11, 2014. Details->
  24. Varona, P., Arroyo, D., & Rodriguez, F. B. (2014). Closed-loop aproaches to characterize transient neural dynamics. In The 10th AIMS Conference on Dynamical Systems,Differential Equations and Application. Madrid, Spain - July 7-11, 2014. Details->
  25. Arroyo, D. (2014). Applications of symbolic dynamics in the context of cryptography. In The 10th AIMS Conference on Dynamical Systems,Differential Equations and Application. Madrid, Spain - July 7-11, 2014. Details->
  26. Arroyo, D. (2014). Characterizacion of neural activity by means of the applied theory of symbolic dynamics. In International Workshop on Neurodynamics. Castro-Urdiales, Spain - July 14-17, 2014. Details->
  27. Latorre, R., Arroyo, D., & Varona, P. (2013). Coordination of complex dynamics by means of simple neural circuits. In NETWORKS 2013. El Escorial, Spain - December 11-13. Details->
  28. Arroyo, D., Chamorro, P., Amigo, J. M., Rodriguez, F. B., & Varona, P. (2012). Event detection, multimodality and non-stationarity: order patterns, a tool to rule them all? In 9th AIMS Conference on Dynamical Systems, Differential Equations and Applications. July 1-5, 2012 Orlando, USA. Details->
  29. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2012). Anonymity revocation through standard infrastructures. In European Public Key Infrastructure Workshop (pp. 112–127). Springer, Berlin, Heidelberg. Details->
  30. Varona, P., Chamorro, P., Muñiz, R., C. Levi, Arroyo, D., & Rodriguez, F. B. (2012). Extension of the dynamic clamp concept in neurophysiology and behavior. In 8th FENS Forum of Neuroscience, Barcelona, July 14-18. Details->
  31. Arroyo, D., Rodriguez, F. B., & Varona, P. (2012). Closing the loop in the context of complex biological systems: goals, needs and challenges. In 8th FENS Forum of Neuroscience, Barcelona, July 14-18. Details->
  32. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2011). An Approach for Adapting Moodle into a Secure Infrastructure. In Á. Herrero & E. Corchado (Eds.), Computational Intelligence in Security for Information Systems (pp. 214–221). Berlin, Heidelberg: Springer Berlin Heidelberg.

    Details->
  33. Arroyo, D., Chamorro, P., Amigo, J. M., Rodriguez, F. B., & Varona, P. (2011). On-line characterization of transient neuronal activity. In IV International Conference Net-Works 2011 Complex Networks: Structure, Applications and Related Topics. El Escorial (Spain), October 26th-28th. Details->
  34. Arroyo, D., Chamorro, P., Rodriguez, F. B., & Varona, P. (2011). Herramientas para la caracterización de actividad neuronal transitoria. In XIV Congreso Nacional de la Sociedad Española de Neurociencia. Salamanca (Spain), 28-30 September. Details->
  35. Arroyo, D., Amigó Garcia José Marı́a, Li, S., & Alvarez, G. (2010). On the inadequacy of unimodal maps for cryptographic applications. In Josep Domingo Ferrer, Antoni Martínez Ballesté, Jordi Castellá Roca, and Agustí Solanas Gómez, editors, XI Reunión Española sobre Criptología y Seguridad de la Información (XI RECSI), pages 37–42, ISBN 978–84–693–3304–4. Universitat Rovira i Virgili, Tarragona, Spain (pp. 37–42). Details->
  36. Ramos, A., Gallego, J., A., Riera, E., San, J., L., … Arroyo, D. (2010). Resultados en I+D y aplicaciones recientes del IA-CSIC en sistemas y tecnologías ultrasónicas. In Número especial de la Revista de Acústica (41º Congreso Nacional de Acústica, 6º Congreso Ibérico de Acústica), volume 41. León (Spain), 13-15 October. Details->
  37. Cardoni, A., Riera, E., Blanco, A., Acosta, V., Arroyo, D., & Gallego, J. A. (2010). Estudio del comportamiento vibracional nolineal de los sistemas ultrasónicos de potencia con radiadores de placa para aplicaciones industriales. In Número especial de la Revista de Acústica (41º Congreso Nacional de Acústica, 6º Congreso Ibérico de Acústica), volume 41. León (Spain), 13-15 October. Details->
  38. Arroyo, D., Blanco, A., Riera, E., & Cardoni, A. (2010). Metodología para la caracterización del comportamiento no lineal de una familia de transductores de ultrasonidos de potencia. In Número especial de la Revista de Acústica (41º Congreso Nacional de Acústica, 6º Congreso Ibérico de Acústica), volume 41. León (Spain), 13-15 October. Details->
  39. Garcia, M. J., Soto, D., Denisenko, N., Arroyo, D., Orue, A. B., & Fernandez, V. (2010). High-Speed Free-Space Quantum Key Distribution System for Urban Applications. In Proceedings of Reunion Espanola sobre Criptologia y Seguridad de la Informacion (RECSI 2010) (pp. 333–336). Details->
  40. Garcia, M. J., Arroyo, D., Denisenko, N., Soto, D., & Fernandez, V. (2010). High-Speed Free-Space Quantum Key Distribution System for Urban Applications. In Photon10. Southampton, U.K. Details->
  41. Arroyo, D., Alvarez, G., & Li, S. (2009). Some hints for the design of digital chaos-based cryptosystems: lessons learned from cryptanalysis. In IFAC Proceedings Volumes (Vol. 42, pp. 171–175). Elsevier. Details->
  42. Arroyo, D., Alvarez, G., & Fernandez, V. (2009). A basic framework for the cryptanalysis of digital chaos-based cryptography. In 2009 6th International Multi-Conference on Systems, Signals and Devices (pp. 1–6). IEEE. Details->
  43. Rhouma, R., Arroyo, D., & Belghith, S. (2009). A new color image cryptosystem based on a piecewise linear chaotic map. In 2009 6th International Multi-Conference on Systems, Signals and Devices (pp. 1–6). IEEE. Details->
  44. Arroyo, D., Alvarez, G., & Amigo, J. M. (2009). Estimation of the control parameter of a map through the analysis of its order patterns. In ICCSA 2009. 29 June - 2 July 2009. Le Havre, France (p. 198). Details->
  45. Arroyo, D., Alvarez, G., & Fernandez, V. (2008). On the inadequacy of the logistic map for cryptographic applications. In A. Martin L. Hernandez, editor, X Reunión Española sobre Criptología y Seguridad de la Información (X RECSI), pages 77–82, (ISBN 978–84–691–5158–7). Universidad de Salamanca, Salamanca, Spain. Details->
  46. Pastor, G., Álvarez Marañón, G., Orúe, A. B., Fernández Mármol, V., Arroyo Guardeño, D., & Romera, M. (2008). Conjuntos de Julia alternados. In F. Marqués y A. Delshams, editor, Nolineal 2008. CIMNE, Barcelona. (p. 192). Details->
  47. Pastor, G., Álvarez Marañón, G., Orúe, A. B., Fernández Mármol, V., Arroyo Guardeño, D., & Romera, M. (2008). Emparejamiento de patrones en medallones de espiral múltiple. In F. Marqués y A. Delshams, editor, Nolineal 2008. CIMNE, Barcelona. (p. 198). Details->
  48. Fernandez, V., Arroyo, D., Garcia, M. J., & Orue, A. B. (2008). Free-space quantum key distribution link at gigahertz clock rates. In QKD Network Demonstration and Conference. Viena. URL http://www. secoqc. net/downloads/abstracts/SECOQC-Fernandez. pdf. Details->
  49. Arroyo Guardeño, D., Rhouma, R., Álvarez, G., Fernandez, V., & Belghith, S. (2008). On the skew tent map as base of a new image chaos-based encryption scheme. In Álvar Ibeas and Jaime Gutiérrez, editors, Second Workshop on Mathematical Cryptology. 23-25 October 2008. Universidad de Cantabria, Santander, Spain. (pp. 113–117). Details->
  50. Fernández Mármol, V., Arroyo Guardeño, D., Garcı́a Martı́nez Marı́a José, Hiskett, P. A., Collins, R. J., Buller, G. S., & Orúe, A. B. (2008). Experimental quantum key distribution at a wavelength of λ~ 850nm. In A. Martin L. Hernandez, editor, X Reunión Española sobre Criptología y Seguridad de la Información (X RECSI), pages 157–161, (ISBN 978–84–691–5158–7). Universidad de Salamanca, Salamanca, Spain. Details->
  51. Pastor, G., Romera, M., Alvarez, G., Nunez, J., Arroyo, D., Orue, A. B., & Montoya, F. (2007). In Medallones de espiral múltiple en el conjunto de Mandelbrot. In NoLineal 2007 (p. 77). Details->
  52. Alvarez, G., Arroyo, D., & Nunez, J. (2007). Application of Gray code to the cryptanalysis of chaotic cryptosystems. In 3rd International IEEE Scientific Conference on Physics and Control (PhysCon’2007, 3rd-7th, September 2007, Potsdam, Germany), IEEE IPACS, Potsdam, Germany. Details->
  53. Álvarez Marañón, G., Arroyo Guardeño, D., & Núñez García, J. (2007). Aplicaciones de los códigos de Gray a la criptografía caótica. In NoLineal 2007, Escuela Universitaria de Magisterio de Ciudad Real. Details->
  54. Orue, A. B., Alvarez, G., Arroyo, D., Nunez, J., & Montoya, F. (2007). Determinación del valor de los parámetros del sistema de Lorenz y aplicación al criptoanálisis de criptosistemas caóticos. In NoLineal 2007, Escuela Universitaria de Magisterio de Ciudad Real. Details->
  55. Pastor, G., Romera, M., Alvarez, G., Nunez, J., Arroyo, D., Orue, A. B., & Montoya, F. (2007). Algoritmo para el cálculo de los argumentos externos de los nodos de un shrub en el conjunto de Mandelbrot. In NoLineal 2007, Escuela Universitaria de Magisterio de Ciudad Real. Details->
  56. Pastor, G., Romera, M., Alvarez, G., Nunez, J., Arroyo, D., Orue, A. B., & Montoya, F. (2007). Pseudoharmonics and pseudoantiharmonics: a new tool to calculate external arguments of Douady and Hubbard. In International Conference on Dynamical methods and Mathematical modelling, page 27. Valladolid. Details->

Journal Articles

  1. Querejeta-Azurmendi, I., Arroyo Guardeño, D., Hernández-Ardieta, J. L., & Hernández Encinas, L. (2020). NetVote: A Strict-Coercion Resistance Re-Voting Based Internet Voting Scheme with Linear Filtering. Mathematics, 8(9), 1618. https://doi.org/10.3390/math8091618

    Details->
  2. Marín-López, A., Chica-Manjarrez, S., Arroyo, D., Almenares-Mendoza, F., & Díaz-Sánchez, D. (2020). Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain. Electronics, 9(11), 1865. Details->
  3. de la Torre, G., Lago, L. F., & Arroyo, D. (2019). On the application of compression based metrics to identifying anomalous behaviour in web traffic. Logic Journal of the IGPL, In Press. Details->
  4. Elices, I., Levi, R., Arroyo, D., Rodriguez, F. B., & Varona, P. (2019). Robust dynamical invariants in sequential neural activity. Scientific Reports, 9(1), 9048. Details->
  5. Gayoso Martı́nez V, Hernández Encinas, L., Martı́n Muñoz A, Álvarez Mariño, M. A., & Arroyo Guardeño, D. (2017). A comparative study of three Spanish eGoverment smart cards. Logic Journal of the IGPL, 25(1), 42–53. Details->
  6. Arroyo, D., Hernandez, F., & Orúe, A. B. (2017). Cryptanalysis of a Classical chaos-based cryptosystem with some quantum cryptography features. International Journal of Bifurcation and Chaos, 27, 1750004 (2017) [12 pages]. Details->
  7. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2014). A formal methodology for integral security design and verification of network protocols. Journal of Systems and Software, 89, 87–98. Details->
  8. Arroyo, D., & Alvarez, G. (2014). Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps. Communications in Nonlinear Science and Numerical Simulation, 19(7), 2345–2353. Details->
  9. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2014). On securing online registration protocols: Formal verification of a new proposal. Knowledge-Based Systems, 59, 149–158. Details->
  10. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2014). New x. 509-based mechanisms for fair anonymity management. Computers & Security, 46, 111–125. Details->
  11. Arroyo, D., Diaz, J., & Rodriguez, F. B. (2013). Cryptanalysis of a one round chaos-based Substitution Permutation Network. Signal Processing, 93(5), 1358–1364. Details->
  12. Garcı́a-Martı́nez MJ, Denisenko, N., Soto, D., Arroyo, D., Orue, A. B., & Fernandez, V. (2013). High-speed free-space quantum key distribution system for urban daylight applications. Applied Optics, 52(14), 3311–3317. Details->
  13. Arroyo, D., Latorre, R., Varona, P., & Rodriguez, F. B. (2013). Application of symbolic dynamics to characterize coordinated activity in the context of biological neural networks. Journal of the Franklin Institute, 350(10), 2967–2981. Details->
  14. Arroyo, D., Chamorro, P., Amigó, J. M., Rodrı́guez FB, & Varona, P. (2013). Event detection, multimodality and non-stationarity: Ordinal patterns, a tool to rule them all? The European Physical Journal Special Topics, 222(2), 457–472. Details->
  15. Chamorro, P., Muñiz, C., Levi, R., Arroyo, D., Rodrı́guez Francisco B, & Varona, P. (2012). Generalization of the dynamic clamp concept in neurophysiology and behavior. PLoS One, 7(7), e40887. Details->
  16. Arroyo, D., Alvarez, G., Amigó José Marı́a, & Li, S. (2011). Cryptanalysis of a family of self-synchronizing chaotic stream ciphers. Communications in Nonlinear Science and Numerical Simulation, 16(2), 805–813. Details->
  17. Arroyo, D., Li, S., Amigó José Marı́a, Alvarez, G., & Rhouma, R. (2010). Comments on "Image encryption with chaotically coupled chaotic maps". Physica D: Nonlinear Phenomena, 239(12), 1002–1006. Details->
  18. Li, C., Arroyo, D., & Lo, K.-T. (2010). Breaking a chaotic cryptographic scheme based on composition maps. International Journal of Bifurcation and Chaos, 20(08), 2561–2568. Details->
  19. Arroyo, D., Li, C., Li, S., Alvarez, G., & Halang, W. A. (2009). Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos, Solitons & Fractals, 41(5), 2613–2616. Details->
  20. Arroyo, D., Li, C., Li, S., & Alvarez, G. (2009). Cryptanalysis of a computer cryptography scheme based on a filter bank. Chaos, Solitons & Fractals, 41(1), 410–413. Details->
  21. Arroyo, D., Alvarez, G., & Amigó José Marı́a. (2009). Estimation of the control parameter from symbolic sequences: Unimodal maps with variable critical point. Chaos: An Interdisciplinary Journal of Nonlinear Science, 19(2), 023125. Details->
  22. Rhouma, R., Solak, E., Arroyo, D., LI, S., Alvarez, G., & Belghith, S. (2009). Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key” [Phys. Lett. A 372 (2008) 5427]. Physics Letters A, 373(37), 3398–3400. Details->
  23. Pastor, G., Romera, M., Alvarez, G., Arroyo, D., Orue, A. B., Fernandez, V., & Montoya, F. (2009). A general view of pseudoharmonics and pseudoantiharmonics to calculate external arguments of Douady and Hubbard. Applied Mathematics and Computation, 213(2), 484–497. Details->
  24. Romera, M., Pastor, G., Orue, A. B., Arroyo, D., & Montoya, F. (2009). Coupling patterns of external arguments in the multiple-spiral medallions of the Mandelbrot set. Discrete Dynamics in Nature and Society, 2009. Details->
  25. Arroyo, D., Alvarez, G., Li, S., Li, C., & Fernandez, V. (2009). Cryptanalysis of a new chaotic cryptosystem based on ergodicity. International Journal of Modern Physics B, 23(05), 651–659. Details->
  26. Romera, M., Alvarez, G., Arroyo, D., Orue, A. B., Fernandez, V., & Pastor, G. (2008). Drawing and computing external rays in the multiple-spiral medallions of the Mandelbrot set. Computers & Graphics, 32(5), 597–610. Details->
  27. Arroyo, D., Alvarez, G., Li, S., Li, C., & Nunez, J. (2008). Cryptanalysis of a discrete-time synchronous chaotic encryption system. Physics Letters A, 372(7), 1034–1039. Details->
  28. Arroyo, D., Rhouma, R., Alvarez, G., Li, S., & Fernandez, V. (2008). On the security of a new image encryption scheme based on chaotic map lattices. Chaos: An Interdisciplinary Journal of Nonlinear Science, 18(3), 033112. Details->
  29. Pastor, G., Romera, M., Alvarez, G., Arroyo, D., Orúe, A. B., Fernandez, V., & Montoya, F. (2008). Algorithm for external arguments calculation of the nodes of a shrub in the Mandelbrot set. Fractals, 16(02), 159–168. Details->
  30. Pastor, G., Romera, M., Alvarez, G., Arroyo, D., & Montoya, F. (2007). On periodic and chaotic regions in the Mandelbrot set. Chaos, Solitons & Fractals, 32(1), 15–25. Details->
  31. Pastor, G., Romera, M., Alvarez, G., Nunez, J., Arroyo, D., Montoya, F., & others. (2007). Operating with external arguments of Douady and Hubbard. Discrete Dynamics in Nature and Society, 2007, 1–17. Details->
  32. Pastor, G., Romera, M., Alvarez, G., Arroyo, D., & Montoya, F. (2006). Equivalence between subshrubs and chaotic bands in the Mandelbrot set. Discrete Dynamics in Nature and Society, 2006. Details->

Books

  1. Arroyo Guardeño, D., Gayoso Martínez, V., & Hernández Encinas, L. (2020). ¿Qué sabemos de? Ciberseguridad. CSIC-Catarata.

    Details->
  2. Arroyo Guardeño, D., Díaz Vico, J., & Hernández Encinas, L. (2019). ¿Qué sabemos de? Blockchain. Retrieved from https://www.catarata.org/libro/blockchain_94238/ Details->

Book Chapters

  1. Diaz, J., Choi, S. G., Arroyo, D., Keromytis, A. D., Rodriguez, F. B., & Yung, M. (2019). A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions. In Advances in Cyber Security: Principles, Techniques, and Applications (pp. 143–183). Springer, Singapore. Details->
  2. Sanchez-Gomez, A., Diaz, J., Hernandez-Encinas, L., & Arroyo, D. (2018). Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers. In Computer and Network Security Essentials (pp. 263–281). Springer, Cham. Details->
  3. Varona, P., Arroyo, D., Rodríguez, F. B., & Nowotny, T. (2016). Chapter 6 - Online Event Detection Requirements in Closed-Loop Neuroscience. In A. E. Hady (Ed.), Closed Loop Neuroscience (pp. 81–91). San Diego: Academic Press. https://doi.org/https://doi.org/10.1016/B978-0-12-802452-2.00006-8 Details->
  4. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2011). An approach for adapting moodle into a secure infrastructure. In Computational Intelligence in Security for Information Systems (pp. 214–221). Springer, Berlin, Heidelberg. Details->
  5. Alvarez, G., Amigó José Marı́a, Arroyo, D., & Li, S. (2011). Lessons learnt from the cryptanalysis of chaos-based ciphers. In Chaos-Based Cryptography (pp. 257–295). Springer, Berlin, Heidelberg. Details->

Miscellaneous

  1. Andrés, P. de, Arroyo, D., Correia, R., & Rezola, A. (2019). Regulatory and Market Challenges of Initial Coin Offerings. European Corporate Governance Institute-Law Working Paper. Retrieved from https://ecgi.global/working-paper/regulatory-and-market-challenges-initial-coin-offerings Details->
  2. Elices, I., Levi, R., Arroyo, D., Francisco de Borja, B. R., & Varona, P. (2018). Robust dynamical invariants in sequential neural activity. bioRxiv. Cold Spring Harbor Laboratory. Details->
  3. Arroyo, D., Hernandez, F., & Orúe, A. B. (2016). Cryptanalysis of a Classical chaos-based cryptosystem with some quantum cryptography features. https://arxiv.org/abs/1610.08475. Details->
  4. Diaz, J., Arroyo, D., & Borja Rodrı́guez Francisco. (2015). libgroupsig: An extensible C library for group signatures. IACR Cryptology ePrint Archive. Details->
  5. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2014). Fair anonymity for the Tor network. arXiv preprint arXiv:1412.4707. Details->
  6. Diaz, J., Arroyo, D., & Rodriguez, F. B. (2012). Formal security analysis of registration protocols for interactive systems: a methodology and a case of study. arXiv preprint arXiv:1201.1134. Details->
  7. Arroyo, D., Chamorro, P., Amigó José Marı́a, Rodrı́guez Francisco B., & Varona, P. (2011). On-line characterization of transient neuronal activity. International Journal of Complex Systems in Science. Details->
  8. Arroyo Guardeño, D. (2009). Aplicación de los códigos de Gray al estudio de la teorı́a de la dinámica simbólica de mapas caóticos unimodales. Retrieved from http://digital.csic.es/handle/10261/16791 Details->
  9. Sanchez-Gomez, A., Diaz, J., & Arroyo, D. Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges. https://arxiv.org/abs/1610.08727. Details->

Theses

  1. Arroyo Guardeño, D. (2009). Framework for the analysis and design of encryption strategies based on discrete-time chaotic dynamical systems (PhD thesis). Ph. D. thesis, ETSIA of the Polytechnic University. Details->